US7496959B2 - Remote collection of computer forensic evidence - Google Patents
Remote collection of computer forensic evidence Download PDFInfo
- Publication number
- US7496959B2 US7496959B2 US10/608,767 US60876703A US7496959B2 US 7496959 B2 US7496959 B2 US 7496959B2 US 60876703 A US60876703 A US 60876703A US 7496959 B2 US7496959 B2 US 7496959B2
- Authority
- US
- United States
- Prior art keywords
- computing device
- target computing
- forensic
- computer
- acquire
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 86
- 238000004458 analytical method Methods 0.000 claims description 100
- 230000000737 periodic Effects 0.000 claims description 56
- 230000000875 corresponding Effects 0.000 claims description 28
- 230000002547 anomalous Effects 0.000 claims description 22
- 230000001174 ascending Effects 0.000 claims description 14
- 238000004374 forensic analysis Methods 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 6
- 238000004450 types of analysis Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 44
- 238000007405 data analysis Methods 0.000 description 34
- 238000009114 investigational therapy Methods 0.000 description 18
- 235000010384 tocopherol Nutrition 0.000 description 14
- 235000019731 tricalcium phosphate Nutrition 0.000 description 14
- 238000010606 normalization Methods 0.000 description 10
- 230000000694 effects Effects 0.000 description 8
- 238000004321 preservation Methods 0.000 description 6
- 230000001343 mnemonic Effects 0.000 description 4
- 235000010956 sodium stearoyl-2-lactylate Nutrition 0.000 description 4
- 230000006399 behavior Effects 0.000 description 2
- 230000002902 bimodal Effects 0.000 description 2
- 230000002708 enhancing Effects 0.000 description 2
- 230000036316 preload Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Abstract
Description
Bin#=floor(((log(gapi)−log(min))/(log(max)−log(k)))*binsmax), (1)
wherein min is the dynamically calculated minimum gap size, max is the dynamically calculated maximum gap size, binsmax is the maximum number of bins, k is the minimum number of the smallest bin, and gapi is the ith gap size (gap of interest). Binsmax and k may be preconfigured values or values that are specified by user 15 upon executing the analysis script.
Claims (95)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/608,767 US7496959B2 (en) | 2003-06-23 | 2003-06-23 | Remote collection of computer forensic evidence |
US12/370,447 US8176557B2 (en) | 2003-06-23 | 2009-02-12 | Remote collection of computer forensic evidence |
US12/469,558 US8458805B2 (en) | 2003-06-23 | 2009-05-20 | Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data |
US13/465,859 US8474047B2 (en) | 2003-06-23 | 2012-05-07 | Remote collection of computer forensic evidence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/608,767 US7496959B2 (en) | 2003-06-23 | 2003-06-23 | Remote collection of computer forensic evidence |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date | |
---|---|---|---|---|
US11/496,252 Continuation-In-Part US7818804B2 (en) | 2003-06-23 | 2006-07-31 | Empirical privilege profiler (EPP) for software programs |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/370,447 Division US8176557B2 (en) | 2003-06-23 | 2009-02-12 | Remote collection of computer forensic evidence |
Publications (2)
Publication Number | Publication Date |
---|---|
US20040260733A1 US20040260733A1 (en) | 2004-12-23 |
US7496959B2 true US7496959B2 (en) | 2009-02-24 |
Family
ID=33518143
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/608,767 Active 2026-06-28 US7496959B2 (en) | 2003-06-23 | 2003-06-23 | Remote collection of computer forensic evidence |
US12/370,447 Active 2024-10-07 US8176557B2 (en) | 2003-06-23 | 2009-02-12 | Remote collection of computer forensic evidence |
US13/465,859 Active US8474047B2 (en) | 2003-06-23 | 2012-05-07 | Remote collection of computer forensic evidence |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/370,447 Active 2024-10-07 US8176557B2 (en) | 2003-06-23 | 2009-02-12 | Remote collection of computer forensic evidence |
US13/465,859 Active US8474047B2 (en) | 2003-06-23 | 2012-05-07 | Remote collection of computer forensic evidence |
Country Status (1)
Country | Link |
---|---|
US (3) | US7496959B2 (en) |
Cited By (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030069676A1 (en) * | 2001-10-05 | 2003-04-10 | Koyo Seiko Co., Ltd. | Electric power steering apparatus |
US20040064710A1 (en) * | 2002-09-30 | 2004-04-01 | Pervasive Security Systems, Inc. | Document security system that permits external users to gain access to secured files |
US20050071275A1 (en) * | 2003-09-30 | 2005-03-31 | Pss Systems, Inc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US20050086531A1 (en) * | 2003-10-20 | 2005-04-21 | Pss Systems, Inc. | Method and system for proxy approval of security changes for a file security system |
US20050138383A1 (en) * | 2003-12-22 | 2005-06-23 | Pss Systems, Inc. | Method and system for validating timestamps |
US20050138371A1 (en) * | 2003-12-19 | 2005-06-23 | Pss Systems, Inc. | Method and system for distribution of notifications in file security systems |
US20070233688A1 (en) * | 2006-04-04 | 2007-10-04 | Karla Weekes Smolen | Online system for exchanging fraud investigation information |
US20070283158A1 (en) * | 2006-06-02 | 2007-12-06 | Microsoft Corporation Microsoft Patent Group | System and method for generating a forensic file |
US20080195543A1 (en) * | 2005-05-27 | 2008-08-14 | Qinetiq Limited | Digital Evidence Bag |
US20080208475A1 (en) * | 2007-02-25 | 2008-08-28 | George Karr | Drilling collaboration infrastructure |
US20080243955A1 (en) * | 2004-12-09 | 2008-10-02 | New Technologies Armor, Inc. | Bit Stream Backup Incorporating Parallel Processes |
US20090089361A1 (en) * | 2007-08-25 | 2009-04-02 | Vere Software | Online evidence collection |
US20090100268A1 (en) * | 2001-12-12 | 2009-04-16 | Guardian Data Storage, Llc | Methods and systems for providing access control to secured data |
US20090136140A1 (en) * | 2007-11-26 | 2009-05-28 | Youngsoo Kim | System for analyzing forensic evidence using image filter and method thereof |
US20090150998A1 (en) * | 2003-06-23 | 2009-06-11 | Architecture Technology Corporation | Remote collection of computer forensic evidence |
US20090249077A1 (en) * | 2008-03-31 | 2009-10-01 | International Business Machines Corporation | Method and system for authenticating users with a one time password using an image reader |
US20090254972A1 (en) * | 2001-12-12 | 2009-10-08 | Guardian Data Storage, Llc | Method and System for Implementing Changes to Security Policies in a Distributed Security System |
US20090288164A1 (en) * | 2003-06-23 | 2009-11-19 | Architecture Technology Corporation | Digital forensic analysis using empirical privilege profiling (epp) for filtering collected data |
US20100299430A1 (en) * | 2009-05-22 | 2010-11-25 | Architecture Technology Corporation | Automated acquisition of volatile forensic evidence from network devices |
US7913311B2 (en) | 2001-12-12 | 2011-03-22 | Rossmann Alain | Methods and systems for providing access control to electronic data |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US8327138B2 (en) | 2003-09-30 | 2012-12-04 | Guardian Data Storage Llc | Method and system for securing digital assets using process-driven security policies |
USRE43906E1 (en) | 2001-12-12 | 2013-01-01 | Guardian Data Storage Llc | Method and apparatus for securing digital assets |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US8793795B1 (en) * | 2005-01-28 | 2014-07-29 | Intelligent Computer Solutions, Inc. | Computer forensic tool |
US20140310287A1 (en) * | 2012-12-17 | 2014-10-16 | Unisys Corporation | Method and system for storing data in commodity computing |
WO2016101006A1 (en) * | 2014-12-23 | 2016-06-30 | University Of South Australia | Data reduction method for digital forensic data |
US9384677B2 (en) | 2008-02-19 | 2016-07-05 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US9680844B2 (en) | 2015-07-06 | 2017-06-13 | Bank Of America Corporation | Automation of collection of forensic evidence |
US20170244734A1 (en) * | 2016-02-19 | 2017-08-24 | Secureworks Corp. | System and Method for Detecting and Monitoring Network Communication |
US9946919B2 (en) | 2014-11-19 | 2018-04-17 | Booz Allen Hamilton Inc. | Device, system, and method for forensic analysis |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US10057298B2 (en) | 2011-02-10 | 2018-08-21 | Architecture Technology Corporation | Configurable investigative tool |
US10067787B2 (en) | 2011-02-10 | 2018-09-04 | Architecture Technology Corporation | Configurable forensic investigative tool |
US10083624B2 (en) | 2015-07-28 | 2018-09-25 | Architecture Technology Corporation | Real-time monitoring of network-based training exercises |
US10346612B1 (en) | 2017-06-19 | 2019-07-09 | Architecture Technology Corporation | Computer network defense training on operational networks using software agents |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US10540502B1 (en) | 2017-06-14 | 2020-01-21 | Architecture Technology Corporation | Software assurance for heterogeneous distributed computing systems |
US10558809B1 (en) | 2017-04-12 | 2020-02-11 | Architecture Technology Corporation | Software assurance system for runtime environments |
US10749890B1 (en) | 2018-06-19 | 2020-08-18 | Architecture Technology Corporation | Systems and methods for improving the ranking and prioritization of attack-related events |
US10803766B1 (en) | 2015-07-28 | 2020-10-13 | Architecture Technology Corporation | Modular training of network-based training exercises |
US10817604B1 (en) | 2018-06-19 | 2020-10-27 | Architecture Technology Corporation | Systems and methods for processing source codes to detect non-malicious faults |
US10868825B1 (en) | 2018-08-14 | 2020-12-15 | Architecture Technology Corporation | Cybersecurity and threat assessment platform for computing environments |
US10949338B1 (en) | 2019-02-07 | 2021-03-16 | Architecture Technology Corporation | Automated software bug discovery and assessment |
US11128654B1 (en) | 2019-02-04 | 2021-09-21 | Architecture Technology Corporation | Systems and methods for unified hierarchical cybersecurity |
US11277480B2 (en) * | 2019-10-01 | 2022-03-15 | Magnet Forensics Investco Inc. | System and method for targeted endpoint data acquisition |
US11403405B1 (en) | 2019-06-27 | 2022-08-02 | Architecture Technology Corporation | Portable vulnerability identification tool for embedded non-IP devices |
US11429713B1 (en) | 2019-01-24 | 2022-08-30 | Architecture Technology Corporation | Artificial intelligence modeling for cyber-attack simulation protocols |
US11451581B2 (en) | 2019-05-20 | 2022-09-20 | Architecture Technology Corporation | Systems and methods for malware detection and mitigation |
US11503075B1 (en) | 2020-01-14 | 2022-11-15 | Architecture Technology Corporation | Systems and methods for continuous compliance of nodes |
Families Citing this family (137)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6792545B2 (en) * | 2002-06-20 | 2004-09-14 | Guidance Software, Inc. | Enterprise computer investigation system |
US7711728B2 (en) * | 2002-06-20 | 2010-05-04 | Guidance Software, Inc. | System and method for searching for static data in a computer investigation system |
US20070011450A1 (en) * | 2004-09-14 | 2007-01-11 | Mccreight Shawn | System and method for concurrent discovery and survey of networked devices |
US7454443B2 (en) * | 2003-08-26 | 2008-11-18 | Tamir Ram | Method, system, and program for personal data management using content-based replication |
US20060080517A1 (en) * | 2003-11-14 | 2006-04-13 | Brown Christopher L T | Accessing a protected area of a storage device |
US8010553B2 (en) * | 2004-04-05 | 2011-08-30 | George Eagan | Knowledge archival and recollection systems and methods |
US8353028B2 (en) | 2004-06-21 | 2013-01-08 | Ebay Inc. | Render engine, and method of using the same, to verify data for access and/or publication via a computer system |
US20050289187A1 (en) * | 2004-06-29 | 2005-12-29 | Oracle International Corporation | System and method for investigating a data operation performed on a database |
US7441153B1 (en) * | 2005-03-28 | 2008-10-21 | Network Appliance Inc. | Method and system for secure and reliable event logging |
WO2006126006A1 (en) * | 2005-05-27 | 2006-11-30 | Qinetiq Limited | Digital evidence bag |
US7779032B1 (en) * | 2005-07-13 | 2010-08-17 | Basis Technology Corporation | Forensic feature extraction and cross drive analysis |
EP1934840A4 (en) * | 2005-10-06 | 2010-12-15 | Guidance Software Inc | Electronic discovery system and method |
US7941386B2 (en) * | 2005-10-19 | 2011-05-10 | Adf Solutions, Inc. | Forensic systems and methods using search packs that can be edited for enterprise-wide data identification, data sharing, and management |
US7603344B2 (en) | 2005-10-19 | 2009-10-13 | Advanced Digital Forensic Solutions, Inc. | Methods for searching forensic data |
US7644138B2 (en) * | 2005-12-06 | 2010-01-05 | David Sun | Forensics tool for examination and recovery and computer data |
US7640323B2 (en) * | 2005-12-06 | 2009-12-29 | David Sun | Forensics tool for examination and recovery of computer data |
WO2007067424A2 (en) * | 2005-12-06 | 2007-06-14 | David Sun | Forensics tool for examination and recovery of computer data |
US20070239799A1 (en) * | 2006-03-29 | 2007-10-11 | Anirudh Modi | Analyzing log files |
US8819825B2 (en) * | 2006-05-31 | 2014-08-26 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media for generating bait information for trap-based defenses |
US8892735B2 (en) * | 2006-09-28 | 2014-11-18 | Guidance Software, Inc. | Phone home servlet in a computer investigation system |
WO2008050073A1 (en) * | 2006-10-23 | 2008-05-02 | Evidence Talks Limited | System and method for remote forensic access |
US20080209031A1 (en) * | 2007-02-22 | 2008-08-28 | Inventec Corporation | Method of collecting and managing computer device information |
US8959568B2 (en) * | 2007-03-14 | 2015-02-17 | Microsoft Corporation | Enterprise security assessment sharing |
US8955105B2 (en) * | 2007-03-14 | 2015-02-10 | Microsoft Corporation | Endpoint enabled for enterprise security assessment sharing |
US8413247B2 (en) * | 2007-03-14 | 2013-04-02 | Microsoft Corporation | Adaptive data collection for root-cause analysis and intrusion detection |
US20080229419A1 (en) * | 2007-03-16 | 2008-09-18 | Microsoft Corporation | Automated identification of firewall malware scanner deficiencies |
US7899882B2 (en) * | 2007-03-29 | 2011-03-01 | Agile Risk Management Llc | System and method for providing remote forensics capability |
US20080244742A1 (en) * | 2007-04-02 | 2008-10-02 | Microsoft Corporation | Detecting adversaries by correlating detected malware with web access logs |
US7941526B1 (en) | 2007-04-19 | 2011-05-10 | Owl Computing Technologies, Inc. | Transmission of syslog messages over a one-way data link |
US20100211574A1 (en) * | 2007-06-04 | 2010-08-19 | Purdue Research Foundation | Method and Apparatus for Obtaining Forensic Evidence from Personal Digital Technologies |
US9009829B2 (en) * | 2007-06-12 | 2015-04-14 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for baiting inside attackers |
US20080065811A1 (en) * | 2007-11-12 | 2008-03-13 | Ali Jahangiri | Tool and method for forensic examination of a computer |
US20090164522A1 (en) * | 2007-12-20 | 2009-06-25 | E-Fense, Inc. | Computer forensics, e-discovery and incident response methods and systems |
US8280905B2 (en) * | 2007-12-21 | 2012-10-02 | Georgetown University | Automated forensic document signatures |
US8312023B2 (en) * | 2007-12-21 | 2012-11-13 | Georgetown University | Automated forensic document signatures |
US9106630B2 (en) * | 2008-02-01 | 2015-08-11 | Mandiant, Llc | Method and system for collaboration during an event |
US20100030786A1 (en) * | 2008-07-29 | 2010-02-04 | Verizon Corporate Services Group Inc. | System and method for collecting data and evidence |
US8549327B2 (en) * | 2008-10-27 | 2013-10-01 | Bank Of America Corporation | Background service process for local collection of data in an electronic discovery system |
US8769684B2 (en) * | 2008-12-02 | 2014-07-01 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior |
US20100250455A1 (en) * | 2009-03-27 | 2010-09-30 | Bank Of America Corporation | Suggesting potential custodians for cases in an enterprise-wide electronic discovery system |
US20100250735A1 (en) * | 2009-03-27 | 2010-09-30 | Bank Of America Corporation | Monitoring an enterprise network for determining specified computing device usage |
US8806358B2 (en) * | 2009-03-27 | 2014-08-12 | Bank Of America Corporation | Positive identification and bulk addition of custodians to a case within an electronic discovery system |
US8250037B2 (en) * | 2009-03-27 | 2012-08-21 | Bank Of America Corporation | Shared drive data collection tool for an electronic discovery system |
US8572376B2 (en) * | 2009-03-27 | 2013-10-29 | Bank Of America Corporation | Decryption of electronic communication in an electronic discovery enterprise system |
US8224924B2 (en) * | 2009-03-27 | 2012-07-17 | Bank Of America Corporation | Active email collector |
US20100250456A1 (en) * | 2009-03-27 | 2010-09-30 | Bank Of America Corporation | Suggesting preservation notice and survey recipients in an electronic discovery system |
US8364681B2 (en) | 2009-03-27 | 2013-01-29 | Bank Of America Corporation | Electronic discovery system |
US9721227B2 (en) * | 2009-03-27 | 2017-08-01 | Bank Of America Corporation | Custodian management system |
US8200635B2 (en) * | 2009-03-27 | 2012-06-12 | Bank Of America Corporation | Labeling electronic data in an electronic discovery enterprise system |
US9330374B2 (en) | 2009-03-27 | 2016-05-03 | Bank Of America Corporation | Source-to-processing file conversion in an electronic discovery enterprise system |
US8572227B2 (en) * | 2009-03-27 | 2013-10-29 | Bank Of America Corporation | Methods and apparatuses for communicating preservation notices and surveys |
US20100250509A1 (en) * | 2009-03-27 | 2010-09-30 | Bank Of America Corporation | File scanning tool |
US8417716B2 (en) * | 2009-03-27 | 2013-04-09 | Bank Of America Corporation | Profile scanner |
US8504489B2 (en) * | 2009-03-27 | 2013-08-06 | Bank Of America Corporation | Predictive coding of documents in an electronic discovery system |
US20100250266A1 (en) * | 2009-03-27 | 2010-09-30 | Bank Of America Corporation | Cost estimations in an electronic discovery system |
US8998084B2 (en) | 2009-07-17 | 2015-04-07 | Primary Marking Systems, Inc. | Mobile device for tracking evidence |
US8998083B2 (en) * | 2009-07-17 | 2015-04-07 | Primary Marking Systems, Inc. | Systems and methods for the tracking of evidence |
US8220711B2 (en) * | 2009-07-17 | 2012-07-17 | Primary Marking Systems, Inc. | Systems and methods for the tracking of evidence |
US9619851B1 (en) | 2009-07-17 | 2017-04-11 | Primary Marking Systems, Inc. | Mobile device and method for tracking evidence |
US11151676B2 (en) | 2009-07-17 | 2021-10-19 | Primary Marking Systems, Inc. | System and method for tracking sexual assault kit evidence |
KR101078288B1 (en) * | 2009-08-21 | 2011-10-31 | 한국전자통신연구원 | Method and apparatus for collecting evidence |
US8880682B2 (en) * | 2009-10-06 | 2014-11-04 | Emc Corporation | Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations |
US9053454B2 (en) * | 2009-11-30 | 2015-06-09 | Bank Of America Corporation | Automated straight-through processing in an electronic discovery system |
US20110153748A1 (en) * | 2009-12-18 | 2011-06-23 | Electronics And Telecommunications Research Institute | Remote forensics system based on network |
US8528091B2 (en) | 2009-12-31 | 2013-09-03 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for detecting covert malware |
US8576283B1 (en) * | 2010-01-05 | 2013-11-05 | Target Brands, Inc. | Hash-based chain of custody preservation |
GB2478554A (en) * | 2010-03-09 | 2011-09-14 | Roke Manor Research | A digital forensic evidence data capture tool for a cloud computing system |
US20110320562A1 (en) * | 2010-06-24 | 2011-12-29 | Battlefield Telecommunications Systems, Llc | Data Extraction System And Device |
KR101407060B1 (en) * | 2010-10-27 | 2014-06-13 | 한국전자통신연구원 | Method for analysis and validation of online data for digital forensics and system using the same |
US8931089B2 (en) * | 2011-01-12 | 2015-01-06 | Korea Advanced Institute Of Science And Technology | System and method for implementing a hidden server |
US9244933B2 (en) | 2011-04-29 | 2016-01-26 | International Business Machines Corporation | Disk image introspection for storage systems |
US10356106B2 (en) | 2011-07-26 | 2019-07-16 | Palo Alto Networks (Israel Analytics) Ltd. | Detecting anomaly action within a computer network |
US8412945B2 (en) | 2011-08-09 | 2013-04-02 | CloudPassage, Inc. | Systems and methods for implementing security in a cloud computing environment |
US9037630B2 (en) | 2012-02-21 | 2015-05-19 | Matthew Martin Shannon | Systems and methods for provisioning digital forensics services remotely over public and private networks |
US8825848B1 (en) * | 2012-03-20 | 2014-09-02 | Emc Corporation | Ordering of event records in an electronic system for forensic analysis |
US9092625B1 (en) * | 2012-07-03 | 2015-07-28 | Bromium, Inc. | Micro-virtual machine forensics and detection |
US10607007B2 (en) | 2012-07-03 | 2020-03-31 | Hewlett-Packard Development Company, L.P. | Micro-virtual machine forensics and detection |
US9626373B2 (en) | 2012-10-01 | 2017-04-18 | Western Digital Technologies, Inc. | Optimizing data block size for deduplication |
US20140181975A1 (en) | 2012-11-06 | 2014-06-26 | William Spernow | Method to scan a forensic image of a computer system with multiple malicious code detection engines simultaneously from a master control point |
US9922192B1 (en) | 2012-12-07 | 2018-03-20 | Bromium, Inc. | Micro-virtual machine forensics and detection |
GB2503600B (en) * | 2012-12-21 | 2014-05-14 | Mobile Content Man Solutions Ltd | Digital memory imaging system and method |
EP2946332B1 (en) * | 2013-01-16 | 2018-06-13 | Palo Alto Networks (Israel Analytics) Ltd | Automated forensics of computer systems using behavioral intelligence |
US10810303B1 (en) * | 2013-02-26 | 2020-10-20 | Jonathan Grier | Apparatus and methods for selective location and duplication of relevant data |
US10740858B2 (en) * | 2013-02-28 | 2020-08-11 | Open Text Holdings, Inc. | System and method for collecting forensic data via a mobile device |
US9148418B2 (en) | 2013-05-10 | 2015-09-29 | Matthew Martin Shannon | Systems and methods for remote access to computer data over public and private networks via a software switch |
KR101496318B1 (en) * | 2013-05-30 | 2015-03-03 | 한국전자통신연구원 | Apparatus and method for providing security in remote digital forensics |
US9729410B2 (en) | 2013-10-24 | 2017-08-08 | Jeffrey T Eschbach | Method and system for capturing web content from a web server |
US20160253229A1 (en) * | 2013-10-30 | 2016-09-01 | Hewlett Packard Enterprise Development Lp | Event log analysis |
US9516039B1 (en) | 2013-11-12 | 2016-12-06 | EMC IP Holding Company LLC | Behavioral detection of suspicious host activities in an enterprise |
US9338187B1 (en) * | 2013-11-12 | 2016-05-10 | Emc Corporation | Modeling user working time using authentication events within an enterprise network |
US9049221B1 (en) | 2013-11-12 | 2015-06-02 | Emc Corporation | Detecting suspicious web traffic from an enterprise network |
US10430614B2 (en) | 2014-01-31 | 2019-10-01 | Bromium, Inc. | Automatic initiation of execution analysis |
AU2015292266B2 (en) * | 2014-07-24 | 2019-08-01 | Schatz Forensic Pty Ltd | System and method for simultaneous forensic acquisition, examination and analysis of a computer readable medium at wire speed |
US10075461B2 (en) | 2015-05-31 | 2018-09-11 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of anomalous administrative actions |
JP2016224871A (en) * | 2015-06-03 | 2016-12-28 | 富士通株式会社 | Abnormality detection program, abnormality detection device, and abnormality detection method |
US10447761B2 (en) | 2015-07-31 | 2019-10-15 | Page Vault Inc. | Method and system for capturing web content from a web server as a set of images |
US10158722B2 (en) | 2015-07-31 | 2018-12-18 | Jeffrey T Eschbach | Method and systems for the scheduled capture of web content from web servers as sets of images |
US10855748B2 (en) * | 2015-09-30 | 2020-12-01 | IntegenX, Inc. | Command center |
US10679135B2 (en) * | 2015-11-09 | 2020-06-09 | Nec Corporation | Periodicity analysis on heterogeneous logs |
US10333962B1 (en) | 2016-03-30 | 2019-06-25 | Amazon Technologies, Inc. | Correlating threat information across sources of distributed computing systems |
US10178119B1 (en) | 2016-03-30 | 2019-01-08 | Amazon Technologies, Inc. | Correlating threat information across multiple levels of distributed computing systems |
US10148675B1 (en) * | 2016-03-30 | 2018-12-04 | Amazon Technologies, Inc. | Block-level forensics for distributed computing systems |
US10536476B2 (en) | 2016-07-21 | 2020-01-14 | Sap Se | Realtime triggering framework |
US10482241B2 (en) | 2016-08-24 | 2019-11-19 | Sap Se | Visualization of data distributed in multiple dimensions |
US10542016B2 (en) * | 2016-08-31 | 2020-01-21 | Sap Se | Location enrichment in enterprise threat detection |
US10686829B2 (en) | 2016-09-05 | 2020-06-16 | Palo Alto Networks (Israel Analytics) Ltd. | Identifying changes in use of user credentials |
US10145762B2 (en) | 2016-09-06 | 2018-12-04 | Aardvark Forensics, Llc | Forensic trace evidence material collection, analysis and distribution system |
US10673879B2 (en) | 2016-09-23 | 2020-06-02 | Sap Se | Snapshot of a forensic investigation for enterprise threat detection |
US10630705B2 (en) | 2016-09-23 | 2020-04-21 | Sap Se | Real-time push API for log events in enterprise threat detection |
US10534908B2 (en) | 2016-12-06 | 2020-01-14 | Sap Se | Alerts based on entities in security information and event management products |
US10534907B2 (en) | 2016-12-15 | 2020-01-14 | Sap Se | Providing semantic connectivity between a java application server and enterprise threat detection system using a J2EE data |
US10530792B2 (en) | 2016-12-15 | 2020-01-07 | Sap Se | Using frequency analysis in enterprise threat detection to detect intrusions in a computer system |
US11470094B2 (en) | 2016-12-16 | 2022-10-11 | Sap Se | Bi-directional content replication logic for enterprise threat detection |
US10552605B2 (en) | 2016-12-16 | 2020-02-04 | Sap Se | Anomaly detection in enterprise threat detection |
US10764306B2 (en) | 2016-12-19 | 2020-09-01 | Sap Se | Distributing cloud-computing platform content to enterprise threat detection systems |
US11194915B2 (en) | 2017-04-14 | 2021-12-07 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for testing insider threat detection systems |
CN106919855A (en) * | 2017-04-25 | 2017-07-04 | 王小易 | A kind of law enforcement evidence-obtaining system and its evidence collecting method based on USB flash disk |
US10546133B2 (en) * | 2017-06-12 | 2020-01-28 | The Travelers Indemnity Company | Digital forensics system |
US10530794B2 (en) | 2017-06-30 | 2020-01-07 | Sap Se | Pattern creation in enterprise threat detection |
US10986111B2 (en) | 2017-12-19 | 2021-04-20 | Sap Se | Displaying a series of events along a time axis in enterprise threat detection |
US10681064B2 (en) | 2017-12-19 | 2020-06-09 | Sap Se | Analysis of complex relationships among information technology security-relevant entities using a network graph |
US10999304B2 (en) | 2018-04-11 | 2021-05-04 | Palo Alto Networks (Israel Analytics) Ltd. | Bind shell attack detection |
US10432665B1 (en) * | 2018-09-03 | 2019-10-01 | Illusive Networks Ltd. | Creating, managing and deploying deceptions on mobile devices |
CN109471993A (en) * | 2018-10-09 | 2019-03-15 | 重庆易保全网络科技有限公司 | Online webpage evidence collecting method, device, storage medium and equipment in real time |
CN109819101A (en) * | 2018-12-18 | 2019-05-28 | 法信公证云(厦门)科技有限公司 | A kind of evidence collecting method and Specialised mobile terminal of collecting evidence |
US11184376B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Port scan detection using destination profiles |
US11316872B2 (en) | 2019-01-30 | 2022-04-26 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using port profiles |
US11184377B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using source profiles |
US11184378B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Scanner probe detection |
US11070569B2 (en) | 2019-01-30 | 2021-07-20 | Palo Alto Networks (Israel Analytics) Ltd. | Detecting outlier pairs of scanned ports |
CN110490773A (en) * | 2019-07-26 | 2019-11-22 | 阿里巴巴集团控股有限公司 | A kind of record screen evidence collecting method, device and electronic equipment based on block chain |
CN111108522A (en) | 2019-08-12 | 2020-05-05 | 阿里巴巴集团控股有限公司 | Block chain based summons delivery |
WO2021026736A1 (en) | 2019-08-12 | 2021-02-18 | Advanced New Technologies Co., Ltd. | Blockchain-based judgment execution |
US11444974B1 (en) | 2019-10-23 | 2022-09-13 | Architecture Technology Corporation | Systems and methods for cyber-physical threat modeling |
US11012492B1 (en) | 2019-12-26 | 2021-05-18 | Palo Alto Networks (Israel Analytics) Ltd. | Human activity detection in computing device transmissions |
US11509680B2 (en) | 2020-09-30 | 2022-11-22 | Palo Alto Networks (Israel Analytics) Ltd. | Classification of cyber-alerts into security incidents |
CN113934669B (en) * | 2021-09-23 | 2022-08-05 | 厦门市美亚柏科信息股份有限公司 | Serial port based GOIP equipment evidence obtaining method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6345283B1 (en) | 1998-07-20 | 2002-02-05 | New Technologies Armor, Inc. | Method and apparatus for forensic analysis of information stored in computer-readable media |
US20020078382A1 (en) | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore |
US20020129264A1 (en) | 2001-01-10 | 2002-09-12 | Rowland Craig H. | Computer security and management system |
WO2002071192A2 (en) | 2001-03-05 | 2002-09-12 | Securify, Inc. | Remote computer forensic evidence collection system and process |
US20020162017A1 (en) | 2000-07-14 | 2002-10-31 | Stephen Sorkin | System and method for analyzing logfiles |
US20020163934A1 (en) | 2001-04-30 | 2002-11-07 | Moore Todd A. | Apparatus and method for network analysis |
US6792545B2 (en) * | 2002-06-20 | 2004-09-14 | Guidance Software, Inc. | Enterprise computer investigation system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8561175B2 (en) | 2003-02-14 | 2013-10-15 | Preventsys, Inc. | System and method for automated policy audit and remediation management |
US7716742B1 (en) | 2003-05-12 | 2010-05-11 | Sourcefire, Inc. | Systems and methods for determining characteristics of a network and analyzing vulnerabilities |
US7496959B2 (en) | 2003-06-23 | 2009-02-24 | Architecture Technology Corporation | Remote collection of computer forensic evidence |
US20070297349A1 (en) | 2003-11-28 | 2007-12-27 | Ofir Arkin | Method and System for Collecting Information Relating to a Communication Network |
US7748040B2 (en) * | 2004-07-12 | 2010-06-29 | Architecture Technology Corporation | Attack correlation using marked information |
WO2006063118A2 (en) | 2004-12-07 | 2006-06-15 | Pure Networks, Inc. | Network management |
US7984452B2 (en) | 2006-11-10 | 2011-07-19 | Cptn Holdings Llc | Event source management using a metadata-driven framework |
US7895317B2 (en) | 2007-06-27 | 2011-02-22 | Computer Associates Think, Inc. | Autonomic control of a distributed computing system using finite state machines |
WO2009029589A1 (en) | 2007-08-25 | 2009-03-05 | Vere Software | Online evidence collection |
US20090164522A1 (en) | 2007-12-20 | 2009-06-25 | E-Fense, Inc. | Computer forensics, e-discovery and incident response methods and systems |
US20100077075A1 (en) | 2008-01-29 | 2010-03-25 | Virtual Instruments Corporation | Network Diagnostic Systems and Methods for Collecting Data From Network Nodes |
US7870238B2 (en) | 2008-02-15 | 2011-01-11 | !J Incorporated | Vendor-independent network configuration tool |
-
2003
- 2003-06-23 US US10/608,767 patent/US7496959B2/en active Active
-
2009
- 2009-02-12 US US12/370,447 patent/US8176557B2/en active Active
-
2012
- 2012-05-07 US US13/465,859 patent/US8474047B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6345283B1 (en) | 1998-07-20 | 2002-02-05 | New Technologies Armor, Inc. | Method and apparatus for forensic analysis of information stored in computer-readable media |
US20030208689A1 (en) * | 2000-06-16 | 2003-11-06 | Garza Joel De La | Remote computer forensic evidence collection system and process |
US20020162017A1 (en) | 2000-07-14 | 2002-10-31 | Stephen Sorkin | System and method for analyzing logfiles |
US20020078382A1 (en) | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore |
US20020129264A1 (en) | 2001-01-10 | 2002-09-12 | Rowland Craig H. | Computer security and management system |
US7058968B2 (en) * | 2001-01-10 | 2006-06-06 | Cisco Technology, Inc. | Computer security and management system |
WO2002071192A2 (en) | 2001-03-05 | 2002-09-12 | Securify, Inc. | Remote computer forensic evidence collection system and process |
US20020163934A1 (en) | 2001-04-30 | 2002-11-07 | Moore Todd A. | Apparatus and method for network analysis |
US6792545B2 (en) * | 2002-06-20 | 2004-09-14 | Guidance Software, Inc. | Enterprise computer investigation system |
Cited By (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030069676A1 (en) * | 2001-10-05 | 2003-04-10 | Koyo Seiko Co., Ltd. | Electric power steering apparatus |
US20090100268A1 (en) * | 2001-12-12 | 2009-04-16 | Guardian Data Storage, Llc | Methods and systems for providing access control to secured data |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
USRE43906E1 (en) | 2001-12-12 | 2013-01-01 | Guardian Data Storage Llc | Method and apparatus for securing digital assets |
US10229279B2 (en) | 2001-12-12 | 2019-03-12 | Intellectual Ventures I Llc | Methods and systems for providing access control to secured data |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US9542560B2 (en) | 2001-12-12 | 2017-01-10 | Intellectual Ventures I Llc | Methods and systems for providing access control to secured data |
US9129120B2 (en) | 2001-12-12 | 2015-09-08 | Intellectual Ventures I Llc | Methods and systems for providing access control to secured data |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US8918839B2 (en) | 2001-12-12 | 2014-12-23 | Intellectual Ventures I Llc | System and method for providing multi-location access management to secured items |
US8341407B2 (en) | 2001-12-12 | 2012-12-25 | Guardian Data Storage, Llc | Method and system for protecting electronic data in enterprise environment |
US10769288B2 (en) | 2001-12-12 | 2020-09-08 | Intellectual Property Ventures I Llc | Methods and systems for providing access control to secured data |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US8543827B2 (en) | 2001-12-12 | 2013-09-24 | Intellectual Ventures I Llc | Methods and systems for providing access control to secured data |
US8341406B2 (en) | 2001-12-12 | 2012-12-25 | Guardian Data Storage, Llc | System and method for providing different levels of key security for controlling access to secured items |
US8266674B2 (en) | 2001-12-12 | 2012-09-11 | Guardian Data Storage, Llc | Method and system for implementing changes to security policies in a distributed security system |
US20090254972A1 (en) * | 2001-12-12 | 2009-10-08 | Guardian Data Storage, Llc | Method and System for Implementing Changes to Security Policies in a Distributed Security System |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7913311B2 (en) | 2001-12-12 | 2011-03-22 | Rossmann Alain | Methods and systems for providing access control to electronic data |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8943316B2 (en) | 2002-02-12 | 2015-01-27 | Intellectual Ventures I Llc | Document security system that permits external users to gain access to secured files |
USRE47443E1 (en) | 2002-09-30 | 2019-06-18 | Intellectual Ventures I Llc | Document security system that permits external users to gain access to secured files |
US20040064710A1 (en) * | 2002-09-30 | 2004-04-01 | Pervasive Security Systems, Inc. | Document security system that permits external users to gain access to secured files |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US8176557B2 (en) * | 2003-06-23 | 2012-05-08 | Architecture Technology Corporation | Remote collection of computer forensic evidence |
US20090150998A1 (en) * | 2003-06-23 | 2009-06-11 | Architecture Technology Corporation | Remote collection of computer forensic evidence |
US20090288164A1 (en) * | 2003-06-23 | 2009-11-19 | Architecture Technology Corporation | Digital forensic analysis using empirical privilege profiling (epp) for filtering collected data |
US8474047B2 (en) | 2003-06-23 | 2013-06-25 | Architecture Technology Corporation | Remote collection of computer forensic evidence |
US8458805B2 (en) | 2003-06-23 | 2013-06-04 | Architecture Technology Corporation | Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data |
US8739302B2 (en) | 2003-09-30 | 2014-05-27 | Intellectual Ventures I Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US8327138B2 (en) | 2003-09-30 | 2012-12-04 | Guardian Data Storage Llc | Method and system for securing digital assets using process-driven security policies |
US20050071275A1 (en) * | 2003-09-30 | 2005-03-31 | Pss Systems, Inc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US20050086531A1 (en) * | 2003-10-20 | 2005-04-21 | Pss Systems, Inc. | Method and system for proxy approval of security changes for a file security system |
US20050138371A1 (en) * | 2003-12-19 | 2005-06-23 | Pss Systems, Inc. | Method and system for distribution of notifications in file security systems |
US20050138383A1 (en) * | 2003-12-22 | 2005-06-23 | Pss Systems, Inc. | Method and system for validating timestamps |
US7702909B2 (en) * | 2003-12-22 | 2010-04-20 | Klimenty Vainstein | Method and system for validating timestamps |
US20080243955A1 (en) * | 2004-12-09 | 2008-10-02 | New Technologies Armor, Inc. | Bit Stream Backup Incorporating Parallel Processes |
US8793795B1 (en) * | 2005-01-28 | 2014-07-29 | Intelligent Computer Solutions, Inc. | Computer forensic tool |
US20080195543A1 (en) * | 2005-05-27 | 2008-08-14 | Qinetiq Limited | Digital Evidence Bag |
US20070233688A1 (en) * | 2006-04-04 | 2007-10-04 | Karla Weekes Smolen | Online system for exchanging fraud investigation information |
US20070283158A1 (en) * | 2006-06-02 | 2007-12-06 | Microsoft Corporation Microsoft Patent Group | System and method for generating a forensic file |
US7945488B2 (en) * | 2007-02-25 | 2011-05-17 | Schlumberger Technology Corporation | Drilling collaboration infrastructure |
US20080208475A1 (en) * | 2007-02-25 | 2008-08-28 | George Karr | Drilling collaboration infrastructure |
US8417776B2 (en) * | 2007-08-25 | 2013-04-09 | Vere Software, Inc. | Online evidence collection |
US20090089361A1 (en) * | 2007-08-25 | 2009-04-02 | Vere Software | Online evidence collection |
US8422730B2 (en) * | 2007-11-26 | 2013-04-16 | Electronics And Telecommunications Research Institute | System for analyzing forensic evidence using image filter and method thereof |
US20090136140A1 (en) * | 2007-11-26 | 2009-05-28 | Youngsoo Kim | System for analyzing forensic evidence using image filter and method thereof |
US10777093B1 (en) | 2008-02-19 | 2020-09-15 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US9384677B2 (en) | 2008-02-19 | 2016-07-05 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US10068493B2 (en) | 2008-02-19 | 2018-09-04 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US20090249077A1 (en) * | 2008-03-31 | 2009-10-01 | International Business Machines Corporation | Method and system for authenticating users with a one time password using an image reader |
US8024576B2 (en) * | 2008-03-31 | 2011-09-20 | International Business Machines Corporation | Method and system for authenticating users with a one time password using an image reader |
US20100299430A1 (en) * | 2009-05-22 | 2010-11-25 | Architecture Technology Corporation | Automated acquisition of volatile forensic evidence from network devices |
US11057438B1 (en) | 2011-02-10 | 2021-07-06 | Architecture Technology Corporation | Configurable investigative tool |
US10057298B2 (en) | 2011-02-10 | 2018-08-21 | Architecture Technology Corporation | Configurable investigative tool |
US10067787B2 (en) | 2011-02-10 | 2018-09-04 | Architecture Technology Corporation | Configurable forensic investigative tool |
US20140310287A1 (en) * | 2012-12-17 | 2014-10-16 | Unisys Corporation | Method and system for storing data in commodity computing |
US9946919B2 (en) | 2014-11-19 | 2018-04-17 | Booz Allen Hamilton Inc. | Device, system, and method for forensic analysis |
WO2016101006A1 (en) * | 2014-12-23 | 2016-06-30 | University Of South Australia | Data reduction method for digital forensic data |
US9680844B2 (en) | 2015-07-06 | 2017-06-13 | Bank Of America Corporation | Automation of collection of forensic evidence |
US10872539B1 (en) | 2015-07-28 | 2020-12-22 | Architecture Technology Corporation | Real-time monitoring of network-based training exercises |
US10083624B2 (en) | 2015-07-28 | 2018-09-25 | Architecture Technology Corporation | Real-time monitoring of network-based training exercises |
US10803766B1 (en) | 2015-07-28 | 2020-10-13 | Architecture Technology Corporation | Modular training of network-based training exercises |
US10713360B2 (en) * | 2016-02-19 | 2020-07-14 | Secureworks Corp. | System and method for detecting and monitoring network communication |
US20170244734A1 (en) * | 2016-02-19 | 2017-08-24 | Secureworks Corp. | System and Method for Detecting and Monitoring Network Communication |
US11042647B1 (en) | 2017-04-12 | 2021-06-22 | Architecture Technology Corporation | Software assurance system for runtime environments |
US10558809B1 (en) | 2017-04-12 | 2020-02-11 | Architecture Technology Corporation | Software assurance system for runtime environments |
US10540502B1 (en) | 2017-06-14 | 2020-01-21 | Architecture Technology Corporation | Software assurance for heterogeneous distributed computing systems |
US10909244B1 (en) | 2017-06-19 | 2021-02-02 | Architecture Technology Corporation | Computer network defense training on operational networks using software agents |
US10346612B1 (en) | 2017-06-19 | 2019-07-09 | Architecture Technology Corporation | Computer network defense training on operational networks using software agents |
US10749890B1 (en) | 2018-06-19 | 2020-08-18 | Architecture Technology Corporation | Systems and methods for improving the ranking and prioritization of attack-related events |
US10817604B1 (en) | 2018-06-19 | 2020-10-27 | Architecture Technology Corporation | Systems and methods for processing source codes to detect non-malicious faults |
US11503064B1 (en) | 2018-06-19 | 2022-11-15 | Architecture Technology Corporation | Alert systems and methods for attack-related events |
US10868825B1 (en) | 2018-08-14 | 2020-12-15 | Architecture Technology Corporation | Cybersecurity and threat assessment platform for computing environments |
US11429713B1 (en) | 2019-01-24 | 2022-08-30 | Architecture Technology Corporation | Artificial intelligence modeling for cyber-attack simulation protocols |
US11128654B1 (en) | 2019-02-04 | 2021-09-21 | Architecture Technology Corporation | Systems and methods for unified hierarchical cybersecurity |
US11494295B1 (en) | 2019-02-07 | 2022-11-08 | Architecture Technology Corporation | Automated software bug discovery and assessment |
US10949338B1 (en) | 2019-02-07 | 2021-03-16 | Architecture Technology Corporation | Automated software bug discovery and assessment |
US11451581B2 (en) | 2019-05-20 | 2022-09-20 | Architecture Technology Corporation | Systems and methods for malware detection and mitigation |
US11403405B1 (en) | 2019-06-27 | 2022-08-02 | Architecture Technology Corporation | Portable vulnerability identification tool for embedded non-IP devices |
US11277480B2 (en) * | 2019-10-01 | 2022-03-15 | Magnet Forensics Investco Inc. | System and method for targeted endpoint data acquisition |
US11503075B1 (en) | 2020-01-14 | 2022-11-15 | Architecture Technology Corporation | Systems and methods for continuous compliance of nodes |
Also Published As
Publication number | Publication date |
---|---|
US20090150998A1 (en) | 2009-06-11 |
US8176557B2 (en) | 2012-05-08 |
US8474047B2 (en) | 2013-06-25 |
US20040260733A1 (en) | 2004-12-23 |
US20120221633A1 (en) | 2012-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8474047B2 (en) | Remote collection of computer forensic evidence | |
US8458805B2 (en) | Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data | |
US9825973B2 (en) | Website security | |
US7748040B2 (en) | Attack correlation using marked information | |
US7761918B2 (en) | System and method for scanning a network | |
US7926113B1 (en) | System and method for managing network vulnerability analysis systems | |
US7841007B2 (en) | Method and apparatus for real-time security verification of on-line services | |
US7185366B2 (en) | Security administration server and its host server | |
US6879979B2 (en) | Method to remotely query, safely measure, and securely communicate configuration information of a networked computational device | |
US20070011450A1 (en) | System and method for concurrent discovery and survey of networked devices | |
US20100299430A1 (en) | Automated acquisition of volatile forensic evidence from network devices | |
US7590844B1 (en) | Decryption system and method for network analyzers and security programs | |
US20060161816A1 (en) | System and method for managing events | |
US20110016528A1 (en) | Method and Device for Intrusion Detection | |
US20030188194A1 (en) | Method and apparatus for real-time security verification of on-line services | |
JP2006526221A (en) | Apparatus and method for detecting network vulnerability and evaluating compliance | |
JP2006518080A (en) | Network audit and policy assurance system | |
US8789187B1 (en) | Pattern tracking and capturing human insight in a web application security scanner | |
Terplan | Intranet performance management | |
KR100906389B1 (en) | System, Server and Method for Analyzing Integrated Authentication-Logs based on ?????? | |
Mokhov et al. | Automating MAC spoofer evidence gathering and encoding for investigations | |
JP2005508553A (en) | An apparatus and method for creating, distributing, and enforcing policy advice and monitoring policy compliance in the management of a network of computing devices. | |
Manes et al. | Netglean: a methodology for distributed network security scanning | |
Kumar et al. | Network Intrusion Forensic Analysis Using Intrusion Detection System | |
CN113364744A (en) | Method and system for detecting domain user login authentication abnormity based on windows log |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AIR FORCE, UNITED STATES, NEW YORK Free format text: CONFIRMATORY LICENSE;ASSIGNOR:ODYSSEY RESEARCH ASSOCIATES, INC.;REEL/FRAME:014441/0560 Effective date: 20030825 |
|
AS | Assignment |
Owner name: ARCHITECTURE TECHNOLOGY CORPORATION, MINNESOTA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ADELSTEIN, FRANK N.;STILLERMAN, MATTHEW A.;JOYCE, ROBERT;REEL/FRAME:014667/0926 Effective date: 20031006 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: ARCHITECTURE TECHNOLOGY CORPORATION, MINNESOTA Free format text: SECURITY INTEREST;ASSIGNOR:HEXIS CYBER SOLUTIONS, INC.;REEL/FRAME:033965/0230 Effective date: 20140905 |
|
AS | Assignment |
Owner name: HEXIS CYBER SOLUTIONS, INC., MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ARCHITECTURE TECHNOLOGY CORPORATION;REEL/FRAME:034768/0479 Effective date: 20140905 |
|
AS | Assignment |
Owner name: WATCHGUARD TECHNOLOGIES, INC., WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEXIS CYBER SOLUTIONS, INC.;REEL/FRAME:038882/0089 Effective date: 20160601 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: GOLDMAN SACHS BANK USA, TEXAS Free format text: SECURITY INTEREST;ASSIGNOR:WATCHGUARD TECHNOLOGIES, INC.;REEL/FRAME:052801/0668 Effective date: 20200601 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: WATCHGUARD TECHNOLOGIES, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT;REEL/FRAME:060406/0751 Effective date: 20220630 Owner name: GOLDMAN SACHS SPECIALTY LENDING GROUP, L.P., AS COLLATERAL AGENT, TEXAS Free format text: SECURITY INTEREST;ASSIGNOR:WATCHGUARD TECHNOLOGIES, INC.;REEL/FRAME:060406/0720 Effective date: 20220630 Owner name: BARCLAYS BANK PLC, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:WATCHGUARD TECHNOLOGIES, INC.;REEL/FRAME:060406/0682 Effective date: 20220630 |